Veritas VCS-278 Question Answer
Which two options are determined by the Security Level? (Choose two.)
if the CA fingerprint needs to be confirmed during an installation or upgrade
if a host requires a token during installation
the idle log off timeout for the NetBackup Administration Console
whether insecure communication with NetBackup 8.0 and earlier hosts is allowed
how often CRLs are updated
TESTED 20 Nov 2025
Copyright © 2014-2025 ACE4Sure. All Rights Reserved